Presentation is loading. Please wait.

Presentation is loading. Please wait.

The University of Adelaide, School of Computer Science

Similar presentations


Presentation on theme: "The University of Adelaide, School of Computer Science"— Presentation transcript:

1 The University of Adelaide, School of Computer Science
30 December 2018 Computer Networks, 5th Edition Chapter 6 Congestion Control and Resource Allocation Copyright © 2012, Elsevier Inc. All rights Reserved Chapter 2 — Instructions: Language of the Computer

2 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.1 A potential bottleneck router. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

3 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.2 Multiple flows passing through a set of routers. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

4 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.3 Ratio of throughput to delay as a function of load. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

5 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.4 One four-hop flow competing with three one-hop flows. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

6 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.5 (a) FIFO queuing; (b) tail drop at a FIFO queue. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

7 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.6 Round-robin service of four flows at a router. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

8 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.7 Example of fair queuing in action: (a) Packets with earlier finishing times are sent first; (b) sending of a packet already in progress is completed. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

9 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.8 Packets in transit during additive increase, with one packet being added each RTT. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

10 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.9 Typical TCP sawtooth pattern. Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

11 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.10 Packets in transit during slow start. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

12 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.11 Behavior of TCP congestion control. Colored line = value of CongestionWindow over time; solid bullets at top of graph = timeouts; hash marks at top of graph = time when each packet is transmitted; vertical bars = time when a packet that was eventually retransmitted was first transmitted. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

13 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.12 Fast retransmit based on duplicate ACKs. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

14 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.13 Trace of TCP with fast retransmit. Colored line = CongestionWindow; solid bullet = timeout; hash marks = time when each packet is transmitted; vertical bars = time when a packet that was eventually retransmitted was first transmitted. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

15 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.14 Computing average queue length at a router. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

16 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.15 Weighted running average queue length. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

17 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.16 RED thresholds on a FIFO queue. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

18 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.17 Drop probability function for RED. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

19 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.18 Congestion window versus observed throughput rate (the three graphs are synchronized). Top, congestion window; middle, observed throughput; bottom, buffer space taken up at the router. Colored line = CongestionWindow; solid bullet = timeout; hash marks = time when each packet is transmitted; vertical bars = time when a packet that was eventually retransmitted was first transmitted. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

20 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.19 Trace of TCP Vegas congestion-avoidance mechanism. Top, congestion window; bottom, expected (colored line) and actual (black line) throughput. The shaded area is the region between the α and β thresholds. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

21 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.20 An audio application. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

22 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.21 A playback buffer. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

23 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.22 Example distribution of delays for an Internet connection. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

24 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.23 Taxonomy of applications. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

25 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.24 Two flows with equal average rates but different token bucket descriptions. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

26 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.25 Making reservations on a multicast tree. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

27 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.26 RED with In and Out drop probabilities. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

28 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.27 Diagram for Exercise 6. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved

29 Copyright © 2012, Elsevier Inc. All rights Reserved
FIGURE 6.28 TCP trace for Exercise 27. Chapter 6 Copyright © 2012, Elsevier Inc. All rights Reserved


Download ppt "The University of Adelaide, School of Computer Science"

Similar presentations


Ads by Google